Author of the publication

Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome.

, , , and . NBiS, page 355-360. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Construction of a False Digital Alibi., , , , and . ARES, volume 6908 of Lecture Notes in Computer Science, page 359-373. Springer, (2011)Trustworthy Opportunistic Access to the Internet of Services., , , , , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 469-478. Springer, (2013)A Forensic Analysis of Images on Online Social Networks., , and . INCoS, page 679-684. IEEE Computer Society, (2011)On the Construction of a False Digital Alibi on the Android OS., , , , and . INCoS, page 685-690. IEEE Computer Society, (2011)An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications., , , , and . INCoS, page 157-165. IEEE, (2013)Selection-Based Scheduling Algorithms under Service Level Agreement Constraints., , , and . CSCS, page 134-140. IEEE, (2017)Analyzing the Internet Stability in Presence of Disasters., , , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 253-268. Springer, (2013)The Forensic Analysis of a False Digital Alibi., , , , , and . IMIS, page 114-121. IEEE Computer Society, (2012)Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome., , , and . NBiS, page 355-360. IEEE Computer Society, (2014)Steganography and Secure Communication on Online Social Networks and Online Photo Sharing., , and . BWCCA, page 363-368. IEEE Computer Society, (2011)